@@ -1251,27 +1251,26 @@ static apr_status_t msre_action_ctl_execute(modsec_rec *msr, apr_pool_t *mptmp,
12511251 return -1 ;
12521252 }
12531253
1254- re = apr_pcalloc (msr -> mp , sizeof (rule_exception ));
1255- if (re == NULL ) {
1256- msr_log (msr , 1 , "Ctl: Memory allocation error" );
1257- return -1 ;
1258- }
1259- re -> type = RULE_EXCEPTION_REMOVE_ID ;
1260- re -> param = (const char * )apr_pstrdup (msr -> mp , p1 );
1261- if (re -> param == NULL ) {
1262- msr_log (msr , 1 , "Ctl: Memory allocation error" );
1263- return -1 ;
1264- }
1265- apr_table_addn (msr -> removed_targets , apr_pstrdup (msr -> mp , p2 ), (void * )re );
1266- return 1 ;
1254+ re = apr_pcalloc (msr -> mp , sizeof (rule_exception ));
1255+ if (re == NULL ) {
1256+ msr_log (msr , 1 , "Ctl: Memory allocation error" );
1257+ return -1 ;
1258+ }
1259+ re -> type = RULE_EXCEPTION_REMOVE_ID ;
1260+ re -> param = (const char * )apr_pstrdup (msr -> mp , p1 );
1261+ if (re -> param == NULL ) {
1262+ msr_log (msr , 1 , "Ctl: Memory allocation error" );
1263+ return -1 ;
1264+ }
1265+ apr_table_addn (msr -> removed_targets , apr_pstrdup (msr -> mp , p2 ), (void * )re );
1266+ return 1 ;
12671267 } else
12681268 if (strcasecmp (name , "ruleRemoveTargetByTag" ) == 0 ) {
12691269 rule_exception * re = NULL ;
12701270 char * p1 = NULL , * p2 = NULL ;
12711271 char * savedptr = NULL ;
12721272
12731273 p1 = apr_strtok (value ,";" ,& savedptr );
1274-
12751274 p2 = apr_strtok (NULL ,";" ,& savedptr );
12761275
12771276 if (msr -> txcfg -> debuglog_level >= 4 ) {
@@ -1282,24 +1281,23 @@ static apr_status_t msre_action_ctl_execute(modsec_rec *msr, apr_pool_t *mptmp,
12821281 return -1 ;
12831282 }
12841283
1285- re = apr_pcalloc (msr -> mp , sizeof (rule_exception ));
1286- re -> type = RULE_EXCEPTION_REMOVE_TAG ;
1287- re -> param = (const char * )apr_pstrdup (msr -> mp , p1 );
1288- re -> param_data = msc_pregcomp (msr -> mp , p1 , 0 , NULL , NULL );
1289- if (re -> param_data == NULL ) {
1290- msr_log (msr , 1 , "ModSecurity: Invalid regular expression \"%s\"" , p1 );
1291- return -1 ;
1292- }
1293- apr_table_addn (msr -> removed_targets , apr_pstrdup (msr -> mp , p2 ), (void * )re );
1294- return 1 ;
1284+ re = apr_pcalloc (msr -> mp , sizeof (rule_exception ));
1285+ re -> type = RULE_EXCEPTION_REMOVE_TAG ;
1286+ re -> param = (const char * )apr_pstrdup (msr -> mp , p1 );
1287+ re -> param_data = msc_pregcomp (msr -> mp , p1 , 0 , NULL , NULL );
1288+ if (re -> param_data == NULL ) {
1289+ msr_log (msr , 1 , "ModSecurity: Invalid regular expression \"%s\"" , p1 );
1290+ return -1 ;
1291+ }
1292+ apr_table_addn (msr -> removed_targets , apr_pstrdup (msr -> mp , p2 ), (void * )re );
1293+ return 1 ;
12951294 } else
12961295 if (strcasecmp (name , "ruleRemoveTargetByMsg" ) == 0 ) {
12971296 rule_exception * re = NULL ;
12981297 char * p1 = NULL , * p2 = NULL ;
12991298 char * savedptr = NULL ;
13001299
13011300 p1 = apr_strtok (value ,";" ,& savedptr );
1302-
13031301 p2 = apr_strtok (NULL ,";" ,& savedptr );
13041302
13051303 if (msr -> txcfg -> debuglog_level >= 4 ) {
@@ -1310,23 +1308,20 @@ static apr_status_t msre_action_ctl_execute(modsec_rec *msr, apr_pool_t *mptmp,
13101308 return -1 ;
13111309 }
13121310
1313- re = apr_pcalloc (msr -> mp , sizeof (rule_exception ));
1314- re -> type = RULE_EXCEPTION_REMOVE_MSG ;
1315- re -> param = apr_pstrdup (msr -> mp , p1 );
1316- re -> param_data = msc_pregcomp (msr -> mp , p1 , 0 , NULL , NULL );
1317- if (re -> param_data == NULL ) {
1318- msr_log (msr , 1 , "ModSecurity: Invalid regular expression \"%s\"" , p1 );
1319- return -1 ;
1320- }
1321- apr_table_addn (msr -> removed_targets , apr_pstrdup (msr -> mp , p2 ), (void * )re );
1322- return 1 ;
1323- }
1324- else {
1325- /* Should never happen, but log if it does. */
1326- msr_log (msr , 1 , "Internal Error: Unknown ctl action \"%s\"." , name );
1327- return -1 ;
1311+ re = apr_pcalloc (msr -> mp , sizeof (rule_exception ));
1312+ re -> type = RULE_EXCEPTION_REMOVE_MSG ;
1313+ re -> param = apr_pstrdup (msr -> mp , p1 );
1314+ re -> param_data = msc_pregcomp (msr -> mp , p1 , 0 , NULL , NULL );
1315+ if (re -> param_data == NULL ) {
1316+ msr_log (msr , 1 , "ModSecurity: Invalid regular expression \"%s\"" , p1 );
1317+ return -1 ;
1318+ }
1319+ apr_table_addn (msr -> removed_targets , apr_pstrdup (msr -> mp , p2 ), (void * )re );
1320+ return 1 ;
13281321 }
13291322
1323+ /* Should never happen, but log if it does. */
1324+ msr_log (msr , 1 , "Internal Error: Unknown ctl action \"%s\"." , name );
13301325 return -1 ;
13311326}
13321327
@@ -1764,7 +1759,7 @@ static apr_status_t msre_action_setvar_parse(modsec_rec *msr, apr_pool_t *mptmp,
17641759 var_value = s + 1 ;
17651760 * s = '\0' ;
17661761
1767- while (( * var_value != '\0' ) && ( isspace (* var_value ) )) var_value ++ ;
1762+ while (isspace (* var_value )) var_value ++ ;
17681763 }
17691764
17701765 return msre_action_setvar_execute (msr ,mptmp ,rule ,var_name ,var_value );
0 commit comments